Sciweavers

2269 search results - page 56 / 454
» Behavioral Intrusion Detection
Sort
View
116
Voted
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
15 years 5 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...
CORR
2010
Springer
119views Education» more  CORR 2010»
15 years 4 months ago
Detecting Danger: Applying a Novel Immunological Concept to Intrusion Detection Systems
Julie Greensmith, Uwe Aickelin, Jamie Twycross
FEGC
2009
94views Biometrics» more  FEGC 2009»
15 years 1 months ago
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams
Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-O...
FPL
2005
Springer
138views Hardware» more  FPL 2005»
15 years 9 months ago
Snort Offloader: A Reconfigurable Hardware NIDS Filter
Software-based Network Intrusion Detection Systems (NIDS) often fail to keep up with high-speed network links. In this paper an FPGA-based pre-filter is presented that reduces th...
Haoyu Song, Todd S. Sproull, Michael Attig, John W...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
16 years 4 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...